Masakatsu Nishigaki
Orcid: 0000-0001-6048-3495
According to our database1,
Masakatsu Nishigaki
authored at least 96 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., February, 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024
Proceedings of the IEEE International Joint Conference on Biometrics, 2024
Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction.
Proceedings of the HCI in Business, Government and Organizations, 2024
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Enhancement of a Company-Wide Information Security Management System Through Incident Learning.
SN Comput. Sci., May, 2023
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
2022
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential.
Proceedings of the Advances in Network-Based Information Systems, 2022
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022
Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation.
Proceedings of the Advanced Information Networking and Applications, 2022
2021
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers.
Proceedings of the Advances in Networked-Based Information Systems, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021
2020
J. Inf. Process., 2020
Proceedings of the Intelligent Human Systems Integration 2020, 2020
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks.
Proceedings of the Intelligent Human Systems Integration 2020, 2020
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020
Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email.
Proceedings of the Advanced Information Networking and Applications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Efficient Spoofing Attack Detection against Unknown Sample using End-to-End Anomaly Detection.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS.
Proceedings of the Advances in Network-Based Information Systems, 2018
Micro Disposable Biometric Authentication: An Application Using Fingernail Minute Textures for Nonsensitive Services.
Proceedings of the 2018 3rd International Conference on Biomedical Imaging, 2018
Proceedings of the Advances on Broadband and Wireless Computing, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Editor's Message to Special Issue on "Towards Secure Society Considering Things and Human Aspects".
J. Inf. Process., 2017
Social Innovation Based on the Business Process Perspective: A Case Study of an Unattended Movable Store.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Information Security Practice and Experience, 2017
Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning and Brute-Force Attack Defensibility Along with User Convenience Consideration.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
2016
Study on relationship between user awareness and QoE in communication delay on smartphones.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
Implementation and Initial Evaluation of Game in Which Password Enhancement Factor is Embedded.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016
2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
2012
A Proposal to Realize the Provision of Secure Android Applications - ADMS: An Application Development and Management System.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
A Design Method of Derivative State Constrained H 2 Integral Servo Controller for Suppressing under Damping of Oscillatory System.
Proceedings of the AsiaSim 2012, 2012
2011
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists.
J. Inf. Process., 2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Privacy-preserving similarity evaluation and application to remote biometrics authentication.
Soft Comput., 2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Study of Garment-Wearing Detecting System Using Intra-Body Communication Technology.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
A Security Measure Selection Scheme with Consideration of Potential Lawsuits.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Int. J. Biom., 2008
Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Physical Access Control with Biometric Keys.
Proceedings of the 2008 International Conference on Security & Management, 2008
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story".
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue.
Proceedings of the 2007 International Conference on Security & Management, 2007
A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value.
Proceedings of the 2007 International Conference on Security & Management, 2007
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
Proceedings of the The Second International Conference on Availability, 2007
2006
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints.
Proceedings of the 2006 International Conference on Security & Management, 2006
Proceedings of the Biologically Inspired Approaches to Advanced Information Technology, 2006
2003
A fault-tolerant combinational circuit with fault diagnosis capability - To mask and detect the loss of any one connection between gate circuits.
Syst. Comput. Jpn., 2003
1994
Mixed Mode Circuit Simulator SPLIT2.1 using Dynamic Network Separation and Selective Trace.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Iterated Timing Analysis with Dynamic Partitioning Technique for Bipolar Transistor Circuits.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994